"The long list of developments here [i.e. capacity of powerful government-owned computer systems to scan huge amounts of information; government surveillance of any transmission that uses Web technology or airwave transmission; monetizing of personal digital information by commercial entities] demonstrates that the privacy concerns raised by [Samuel] Warren and [Louis D.] Brandeis in 1890 may still be relevant in abstract principle but quaint in their details. Technology-driven social changes promise to outstrip the capacity of the law to enforce effective controls. Perhaps most ominous is the reality that individuals lack the capacity to protect their own privacy. Probably the only way to monitor electronic surveillance and intrusion effectively is through countervailing institutions and programs that themselves require sophisticated technology, large resources, and their own technocratic personnel; of course, these programs and institutions might have much the same capacity to intrude on personal privacy as the governmental institutions that they claim to monitor. The old question "Who will watch the watchers?" has taken on new meaning and relevance. It catapults the transnational and international protection of privacy rights to the first order of importance." [p.53]
Jackson, Donald W. "Right to Privacy." Governments of the World: A Global Guide to Citizens' Rights and Responsibilities. Ed. C. Neal Tate. Vol. 4. Detroit: Macmillan Reference USA, 2006. 47-54. Gale Virtual Reference Library. Web.
"Personal information is routinely used for purposes other than those originally intended, in most cases without the knowledge of the people involved. This situation constitutes a significant erosion of privacy.
Although there is a wide consensus that privacy—in particular, medical privacy—has been negatively affected by Internet technology (for example, Etzioni 1999 The Limits of Privacy; Johnson 2000 Computer Ethics (3rd); Parenti 2003 The Soft Cage: Surveillance in America from Slavery to the War on Terror), there is less agreement on how to confront the situation. Corporations claim they need personal information on their customers in order to be more efficient and profitable. Government agencies claim they need access to personal information for law enforcement purposes. For some theorists, then, the issue is to find a balance between the desires of individuals to keep information about themselves private and the desires of corporations and government to freely access that information. For others this perspective is too narrow because it transforms privacy issues into the balancing of competing claims [rather than the erosion of a legal right]...
An approach increasingly followed by companies is to develop privacy policies that are made available to their customers, indicating how information about them is used and with what other organizations it will be shared, and offering certain privacy options to customers. But without appropriate legislation many are skeptical that corporations can truly police themselves."
Araya, Agustin A. "Internet." Encyclopedia of Science, Technology, and Ethics. Ed. Carl Mitcham. Vol. 2. Detroit: Macmillan Reference USA, 2005. 1048-1052. Gale Virtual Reference Library. Web.
Your information or data is yours, right? Unless, of course it's not.
Given how closely linked many digital applications and activities are (you can’t register for this conference unless we can harvest your 'friends' list from Facebook!), do individuals still have the power to decide for themselves who will have knowledge of certain aspects of their lives?
removed your name and any other personally identifying information from it.
"Yahoo’s policy is to de-identify search user log data within 18 months of collection, with exceptions to meet legal obligations. ......other types of log data (ie not relating to search) (such as ad views, ad clicks, page views and page clicks) are retained for a longer period.(unspecified)...a temporary (unspecified) copy of that information is routinely made......Please note that any information that we have copied may remain in back-up storage for some period of time (unspecified) after your deletion request."
Even the "little guys" policies imply that your information - once you interact with their website - is their information. And that since their company is inextricably intertwined with social media, we'll blithely hand over your data to others, governed by their privacy policies (which you haven't seen yet).